{"id":13775865,"url":"https://github.com/pan0pt1c0n/python-sockstress","last_synced_at":"2026-02-02T00:09:22.158Z","repository":{"id":18401920,"uuid":"21583431","full_name":"pan0pt1c0n/Python-SockStress","owner":"pan0pt1c0n","description":"SockStress DoS (Denial of Service) exploit written in Python | ","archived":false,"fork":false,"pushed_at":"2015-09-09T22:29:00.000Z","size":131,"stargazers_count":37,"open_issues_count":2,"forks_count":17,"subscribers_count":9,"default_branch":"master","last_synced_at":"2024-11-17T11:47:07.639Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":"http://www.shortbus.ninja/sockstress-denial-of-service-with-python-2/","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/pan0pt1c0n.png","metadata":{"files":{"readme":"README.txt","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2014-07-07T19:17:21.000Z","updated_at":"2024-09-05T02:41:45.000Z","dependencies_parsed_at":"2022-09-09T23:41:35.340Z","dependency_job_id":null,"html_url":"https://github.com/pan0pt1c0n/Python-SockStress","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/pan0pt1c0n%2FPython-SockStress","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/pan0pt1c0n%2FPython-SockStress/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/pan0pt1c0n%2FPython-SockStress/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/pan0pt1c0n%2FPython-SockStress/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/pan0pt1c0n","download_url":"https://codeload.github.com/pan0pt1c0n/Python-SockStress/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":253540462,"owners_count":21924522,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-08-03T17:01:52.919Z","updated_at":"2026-02-02T00:09:22.099Z","avatar_url":"https://github.com/pan0pt1c0n.png","language":"Python","readme":"Proof of Concept on my blog at:\nhttp://www.pan0pt1c0n.net/sockstress-denial-of-service-with-python-2/\n\n\t\t***Basic Usage***\nUsage - ./sock_stress.py [Target-IP] [Port Number] [Threads]\nExample - ./sock_stress.py 10.0.0.5 21 20\nExample will perform a 20x multi-threaded sock-stress DoS attack\nagainst the FTP (port 21) service on 10.0.0.5\n\n\t\t***NOTE***\nMake sure you target a port that responds when a connection is made\n\n","funding_links":[],"categories":["\u003ca id=\"d03d494700077f6a65092985c06bf8e8\"\u003e\u003c/a\u003e工具"],"sub_categories":["\u003ca id=\"57b8e953d394bbed52df2a6976d98dfa\"\u003e\u003c/a\u003eSocks"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fpan0pt1c0n%2Fpython-sockstress","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fpan0pt1c0n%2Fpython-sockstress","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fpan0pt1c0n%2Fpython-sockstress/lists"}